A multi-layer information dispersal based encryption algorithm and its application for access control

Sustainable Computing: Informatics and Systems - Tập 20 - Trang 76-87 - 2018
Quan Qian1,2, Zhi-ting Yu1, Rui Zhang1, Che-Lun Hung3,4
1School of Computer Engineering & Science, Shanghai University, Shanghai 200444, China
2Shanghai Institute for Advanced Communication and Data Science, Shanghai University, Shanghai, 200444, China
3Department of Computer Science and Information Engineering, Chang Gung University, Taoyuan, Taiwan, ROCTaiwan, ROC
4Department of Computer Science and Communication Engineering, Providence University, Taichung, Taiwan, ROC

Tài liệu tham khảo

Li, 2014, Secure and privacy-preserving data storage service in public cloud, J. Comput. Res. Dev., 51, 1397 Hong, 2010, AB-ACCS: a cryptographic access control scheme for cloud storage, J. Comput. Res. Dev., 47, 259 Tian, 2009, DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS, 25 Zhou, 2013 Hu, 2017, Research on encryption strategy in large data environment based on proxy re-encryption, Int. J. Big Data Intell., 4, 10.1504/IJBDI.2017.10006118 Vimercati, 2007, Over-encryption: management of access control evolution on outsourced data, 123 Sun, 1997, Optimal information-dispersal for increasing the reliability of a distributed service, IEEE Trans. Reliab., 46, 462, 10.1109/24.693779 Rabin, 1989, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, 36, 335, 10.1145/62044.62050 Zhao, 2013, Towards high-performance and cost-effective distributed storage systems with information dispersal algorithms, 1 Bian, 2011, Security structure of cloud storage based on dispersal, J. Xian Jiaotong Univ., 45, 41 Muppavarapu, 2014, Semantic-based access control for data resources in open grid services architecture: data access and integration (OGSA-DAI), Int. J. Grid High Perform. Comput., 6, 1, 10.4018/ijghpc.2014040101 Bethencourt, 2007, Ciphertext-policy attribute-based encryption, 321 Hong, 2011, Achieving efficient dynamic cryptographic access control in cloud storage, J. Commun., 32, 125 Hong, 2017, Research on encryption strategy in large data environment based on proxy re-encryption, Int. J. Big Data Intell., 4 Merkle, 1981, On the security of multiple encryption, Commun. ACM, 24, 465, 10.1145/358699.358718 Kumar, 2016, Multiple encryption using ECC and its time complexity analysis, Int. J. Comput. Eng. Res. Trends, 3, 568, 10.22362/ijcert/2016/v3/i11/48907 Singh, 2013, A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, Int. J. Comput. Appl., 67, 33 Qiao, 1998, Comparison of mpeg encryption algorithm, Comput. Graph., 22, 437, 10.1016/S0097-8493(98)00033-8 Tosun, 2001, Lightweight security mechanisms for wireless video transmission, 157 Tosun, 2002, Efficient multi-layer coding and encryption of mpeg video streams, 119 Qiao, 1997, A new algorithm for mpeg video encryption, 21 Gupta, 2013, High-performance hardware implementation for RC4 stream cipher, IEEE Trans. Comput., 64, 730, 10.1109/TC.2012.19 Fluhrer, 2001, Weaknesses in the key scheduling algorithm of RC4, 321 guo Feng, 2002, Status quo and trend of cryptography, J. China Inst. Commun., 23, 18